cvelist/2003/1xxx/CVE-2003-1365.json
2019-03-18 02:52:50 +00:00

92 lines
3.2 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2003-1365",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The escape_dangerous_chars function in CGI::Lite 2.0 and earlier does not correctly remove special characters including (1) \"\\\" (backslash), (2) \"?\", (3) \"~\" (tilde), (4) \"^\" (carat), (5) newline, or (6) carriage return, which could allow remote attackers to read or write arbitrary files, or execute arbitrary commands, in shell scripts that rely on CGI::Lite to filter such dangerous inputs."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://use.perl.org/~cbrooks/journal/10542",
"refsource": "MISC",
"url": "http://use.perl.org/~cbrooks/journal/10542"
},
{
"name": "20030211 Security bug in CGI::Lite::escape_dangerous_chars() function",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/311414"
},
{
"name": "6833",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6833"
},
{
"name": "3237",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3237"
},
{
"name": "cgilite-shell-command-execution(11308)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11308"
},
{
"name": "http://search.cpan.org/~smylers/CGI-Lite-2.02/Lite.pm",
"refsource": "CONFIRM",
"url": "http://search.cpan.org/~smylers/CGI-Lite-2.02/Lite.pm"
},
{
"name": "20030211 Security bug in CGI::Lite::escape_dangerous_chars() function",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0065.html"
}
]
}
}